In TinyWebGallery v2.4, an XSS vulnerability is located in the `mkname`, `mkitem`, and `item` parameters of the `Add/Create` module. Remote attackers with low-privilege user accounts for backend access are able to inject malicious script codes into the `TWG Explorer` item listing. The request method to inject is POST and the attack vector is located on the application-side of the service. The injection point is the add/create input field and the execution point occurs in the item listing after the add or create.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=1997 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:27:04.357Z
Reserved: 2017-11-06T00:00:00
Link: CVE-2017-16635

No data.

Status : Modified
Published: 2017-11-06T22:29:00.413
Modified: 2024-11-21T03:16:43.637
Link: CVE-2017-16635

No data.